Artigos de revistas sobre o tema "Great Firewall"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Great Firewall".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Jagani, Aishwarya. "India’s Great Firewall". Index on Censorship 52, n.º 1 (abril de 2023): 68–71. http://dx.doi.org/10.1177/03064220231165392.
Texto completo da fonteMulvenon, James C., e Michael S. Chase. "Breaching the Great Firewall". Journal of E-Government 2, n.º 4 (31 de julho de 2006): 73–84. http://dx.doi.org/10.1300/j399v02n04_05.
Texto completo da fonteZhang, Lena L. "Behind the ‘Great Firewall’". Convergence: The International Journal of Research into New Media Technologies 12, n.º 3 (agosto de 2006): 271–91. http://dx.doi.org/10.1177/1354856506067201.
Texto completo da fonteLiu, Jingqing. "Enhancing Network Security Through Router-Based Firewalls: An Investigation into Design, Effectiveness, and Human Factors". Highlights in Science, Engineering and Technology 85 (13 de março de 2024): 724–32. http://dx.doi.org/10.54097/axrsnb71.
Texto completo da fonteHughes, Christopher R. "Google and the Great Firewall". Survival 52, n.º 2 (25 de março de 2010): 19–26. http://dx.doi.org/10.1080/00396331003764538.
Texto completo da fonteScarfe-James, Rose. "Chinese voices behind ‘The Great Firewall’". Groundings Undergraduate 6 (1 de abril de 2013): 75–86. http://dx.doi.org/10.36399/groundingsug.6.229.
Texto completo da fonteManaseer, Saher, Ahmad K. Al Hwaitat e Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment". Modern Applied Science 12, n.º 10 (9 de setembro de 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.
Texto completo da fonteTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz e Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems". Journal of Industrial Engineering and Management 11, n.º 2 (6 de abril de 2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Texto completo da fonteEnsafi, Roya, Philipp Winter, Abdullah Mueen e Jedidiah R. Crandall. "Analyzing the Great Firewall of China Over Space and Time". Proceedings on Privacy Enhancing Technologies 2015, n.º 1 (1 de abril de 2015): 61–76. http://dx.doi.org/10.1515/popets-2015-0005.
Texto completo da fonteAnderson, Daniel. "Splinternet Behind the Great Firewall of China". Queue 10, n.º 11 (novembro de 2012): 40–49. http://dx.doi.org/10.1145/2390756.2405036.
Texto completo da fonteGu, Grace. "The Great Firewall of China and Marketplace Disintermediation". Academy of Management Proceedings 2019, n.º 1 (1 de agosto de 2019): 14860. http://dx.doi.org/10.5465/ambpp.2019.14860abstract.
Texto completo da fonteMathieson, SA. "Researchers find way around Great Firewall of China". Infosecurity Today 3, n.º 4 (julho de 2006): 4. http://dx.doi.org/10.1016/s1742-6847(06)70421-9.
Texto completo da fonteHuang, Gregory T. "Going online behind the Great Firewall of China". New Scientist 196, n.º 2629 (novembro de 2007): 66–67. http://dx.doi.org/10.1016/s0262-4079(07)62859-0.
Texto completo da fonteAKDUMAN, Birol. "From the Great Wall to the Great Firewall: A Historical Analysis of Surveillance". International Journal of Social Sciences 7, n.º 28 (13 de maio de 2023): 442–69. http://dx.doi.org/10.52096/usbd.7.28.30.
Texto completo da fonteAKDUMAN, Birol. "From the Great Wall to the Great Firewall: A Historical Analysis of Surveillance". International Journal of Social Sciences 7, n.º 28 (9 de maio de 2023): 293–319. http://dx.doi.org/10.52096/usbd.7.28.21.
Texto completo da fonteLi, Jinying. "Toward a Genealogy of the Wall-Screen". differences 33, n.º 1 (1 de maio de 2022): 28–59. http://dx.doi.org/10.1215/10407391-9735441.
Texto completo da fonteZulfikar, Faisal Mufti. "PEMBATASAN AKSES INTERNET SEBAGAI UPAYA CHINA MENJAGA KEAMANAN NASIONAL: THE GREAT FIREWALL OF CHINA". BHUVANA: Journal of Global Studies 1, n.º 1 (17 de março de 2023): 26–38. http://dx.doi.org/10.59408/bjgs.v1i1.54.
Texto completo da fonteNormile, Dennis. "Science suffers as China plugs holes in Great Firewall". Science 357, n.º 6354 (31 de agosto de 2017): 856. http://dx.doi.org/10.1126/science.357.6354.856.
Texto completo da fonteMarks, Paul. "Will Google's help breach the great firewall of China?" New Scientist 206, n.º 2754 (março de 2010): 17. http://dx.doi.org/10.1016/s0262-4079(10)60777-4.
Texto completo da fonteBensen, Tierney, Patrick Henze e Geoff Farnsworth. "The Great Chinese Firewall: A Safeguard or Stop Sign?" Journal of Information Privacy and Security 2, n.º 3 (julho de 2006): 42–61. http://dx.doi.org/10.1080/15536548.2006.10855797.
Texto completo da fonteHu, Lingyun, Shuai Wen e Hongjun Yuan. "Thinking and Research on the Construction of Web Application Firewall in Smart Campus Environment". International Journal of Education and Humanities 14, n.º 2 (30 de maio de 2024): 66–69. http://dx.doi.org/10.54097/kzcr2296.
Texto completo da fonteStone, R., e H. Xin. "Google Plots Exit Strategy As China Shores Up 'Great Firewall'". Science 327, n.º 5964 (21 de janeiro de 2010): 402–3. http://dx.doi.org/10.1126/science.327.5964.402-a.
Texto completo da fonteWowor, Harvardry Gerald Abraham, Arfin Sudirman e Falhan Hakiki. "China’s Great Firewall: Cybersecurity as Strategy for Building World Cyberpower". JISPO Jurnal Ilmu Sosial dan Ilmu Politik 13, n.º 2 (22 de março de 2024): 193–232. http://dx.doi.org/10.15575/jispo.v13i2.27713.
Texto completo da fonteCurrier, Carrie Liu. "Roberts, Margaret E. Censored: Distraction and Diversion Inside China’s Great Firewall". Journal of Chinese Political Science 24, n.º 4 (7 de novembro de 2019): 713–14. http://dx.doi.org/10.1007/s11366-019-09634-x.
Texto completo da fonteRodzvilla, John. "Margaret E. Roberts: Censored: Distraction and Diversion Inside China’s Great Firewall". Publishing Research Quarterly 35, n.º 1 (17 de janeiro de 2019): 185–86. http://dx.doi.org/10.1007/s12109-019-09635-x.
Texto completo da fonteSHAN, Wei. "Winning Public Opinion Online: China's Internet Content Control". East Asian Policy 06, n.º 03 (julho de 2014): 41–52. http://dx.doi.org/10.1142/s1793930514000257.
Texto completo da fonteSundquist, James. "Censored: Distraction and Diversion Inside China's Great Firewall by Margaret E. Roberts". China Review International 23, n.º 4 (2016): 405–7. http://dx.doi.org/10.1353/cri.2016.0161.
Texto completo da fonteKim, Sung Wook, e Aziz Douai. "Google vs. China’s “Great Firewall”: Ethical implications for free speech and sovereignty". Technology in Society 34, n.º 2 (maio de 2012): 174–81. http://dx.doi.org/10.1016/j.techsoc.2012.02.002.
Texto completo da fonteHaslam, Thomas. "Ubiquitous Learning behind the Great Firewall: Transforming the English Major at Shantou University". Ubiquitous Learning: An International Journal 9, n.º 1 (2016): 9–20. http://dx.doi.org/10.18848/1835-9795/cgp/v09i01/9-20.
Texto completo da fonteZheng, Yanfeng, e Qinyu (Ryan) Wang. "Shadow of the great firewall: The impact of Google blockade on innovation in China". Strategic Management Journal 41, n.º 12 (8 de julho de 2020): 2234–60. http://dx.doi.org/10.1002/smj.3179.
Texto completo da fonteRahayu, Restu Karlina. "A Critical Analysis On Margaret E. Roberts (2018), Censored: Distraction And Diversion Inside China’s Great Firewall". Journal of Political Issues 1, n.º 2 (25 de janeiro de 2020): 92–102. http://dx.doi.org/10.33019/jpi.v1i2.8.
Texto completo da fonteWang, Qi, Ling Li e Shuai Hu. "Computer Network Information Security Protection Faced by Digital Art Museums Based on the Internet of Things". Wireless Communications and Mobile Computing 2021 (15 de dezembro de 2021): 1–10. http://dx.doi.org/10.1155/2021/2297733.
Texto completo da fonteWang, Yu Lin, e Jin Heng Wang. "Research on Security Technology of Campus Network". Advanced Materials Research 971-973 (junho de 2014): 1730–34. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1730.
Texto completo da fonteDev, Kankan. "A Great Approach for Medium Size Hospital Network Infrastructure Architecture". International Journal for Research in Applied Science and Engineering Technology 9, n.º 9 (30 de setembro de 2021): 1440–43. http://dx.doi.org/10.22214/ijraset.2021.38207.
Texto completo da fonteTai, Zixue. "Casting the Ubiquitous Net of Information Control". International Journal of Advanced Pervasive and Ubiquitous Computing 2, n.º 1 (janeiro de 2010): 53–70. http://dx.doi.org/10.4018/japuc.2010010104.
Texto completo da fonteLiu, Hai Yan. "Designed Data Mining System Based on the Distribute Intrusion Detection Designed". Advanced Materials Research 1056 (outubro de 2014): 202–5. http://dx.doi.org/10.4028/www.scientific.net/amr.1056.202.
Texto completo da fonteYang, Qinghua, e Yu Liu. "What’s on the other side of the great firewall? Chinese Web users’ motivations for bypassing the Internet censorship". Computers in Human Behavior 37 (agosto de 2014): 249–57. http://dx.doi.org/10.1016/j.chb.2014.04.054.
Texto completo da fonteLee, Wing Ki. "Network Unavailable". A Peer-Reviewed Journal About 9, n.º 1 (4 de agosto de 2020): 130–41. http://dx.doi.org/10.7146/aprja.v9i1.121495.
Texto completo da fonteGunawan, Teddy Surya, Muhammad Kasim Lim, Mira Kartiwi, Noreha Abdul Malik e Nanang Ismail. "Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks". Indonesian Journal of Electrical Engineering and Computer Science 12, n.º 2 (1 de novembro de 2018): 729. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp729-737.
Texto completo da fonteTaneja, Harsh, e Angela Xiao Wu. "Does the Great Firewall Really Isolate the Chinese? Integrating Access Blockage With Cultural Factors to Explain Web User Behavior". Information Society 30, n.º 5 (2 de outubro de 2014): 297–309. http://dx.doi.org/10.1080/01972243.2014.944728.
Texto completo da fonteRomanovsky, Vladislav, e Rifat Kildeev. "Legal Framework for Counter-Terrorism in Social Networks in Russia and Abroad". SHS Web of Conferences 134 (2022): 00031. http://dx.doi.org/10.1051/shsconf/202213400031.
Texto completo da fontePATOKINA, E. L. "MARKETING STRATEGIES AND TOOLS FOR ENTERING THE CHINESE MARKET". EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 1, n.º 7 (2021): 184–88. http://dx.doi.org/10.36871/ek.up.p.r.2021.07.01.023.
Texto completo da fonteYao, Jian. "Model Design of Big Data Information Security Management Based on the Internet of Things". Security and Communication Networks 2022 (10 de outubro de 2022): 1–10. http://dx.doi.org/10.1155/2022/4380037.
Texto completo da fonteDong, Li Na. "Design of Computer Information Network Security System". Applied Mechanics and Materials 539 (julho de 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.
Texto completo da fonteHan, Rongbin. "Censored: Distraction and Diversion Inside China’s Great Firewall. By Margaret E. Roberts. Princeton: Princeton University Press, 2018. 288p. $29.95 cloth." Perspectives on Politics 16, n.º 4 (23 de novembro de 2018): 1134–35. http://dx.doi.org/10.1017/s1537592718002608.
Texto completo da fonteTucker, Joshua A. "Censored: Distraction and diversion inside China's great firewall. Roberts, Margaret E.Princeton University Press, Princeton, New Jersey, 2018. 288 pp. $29.95 (cloth)". Governance 32, n.º 3 (19 de junho de 2019): 586–87. http://dx.doi.org/10.1111/gove.12420.
Texto completo da fonteResnick, Marc. "Internet-Based Error Reporting Systems: Usability is Power". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, n.º 13 (outubro de 2007): 822–26. http://dx.doi.org/10.1177/154193120705101301.
Texto completo da fonteHartley, John, Lucy Montgomery e Henry Siling Li. "A new model for understanding global media and China: ‘Knowledge clubs’ and ‘knowledge commons’". Global Media and China 2, n.º 1 (março de 2017): 8–27. http://dx.doi.org/10.1177/2059436417705919.
Texto completo da fonteLi, Gongfa, Jianyi Kong, Guozhang Jiang, Liangxi Xie, Han Xiao, Zehao Wu e Siqiang Xu. "Remote Monitoring and Diagnosis System of Rolling Mill Based on CORBA and SOAP/Web Service Technology". Noise & Vibration Worldwide 42, n.º 10 (novembro de 2011): 23–27. http://dx.doi.org/10.1260/0957-4565.42.10.23.
Texto completo da fonteDouglas, Frederick, Weiyang Pan e Matthew Caesar. "Salmon: Robust Proxy Distribution for Censorship Circumvention". Proceedings on Privacy Enhancing Technologies 2016, n.º 4 (1 de outubro de 2016): 4–20. http://dx.doi.org/10.1515/popets-2016-0026.
Texto completo da fonte